Wednesday, 2 November 2016

Whitewidow 1.5.0 - SQL Vulnerability Scanner

Whitewidow is an open source automated SQL vulnerability scanner, that is capable of running through a file list, or can scrape Google for potential vulnerable websites. It allows automatic file formatting, random user agents, IP addresses, server information, multiple SQL injection syntax, and a fun environment. This program was created for learning purposes, and is intended to teach users what vulnerability looks like.

Although whitewidow is a completely open source project, and is completely free. Every once in awhile I need a beer. If you like this program, and like this idea, you can help me with my beer fund.

Screenshots

Usage

ruby whitewidow.rb -h

Will print the help page

ruby whitewidow.rb -c

Will displlay the credits, can also be run in conjunction with -f or -d

ruby whitewidow.rb -l

Will display the legal info, can also be run in conjunction with -f or -d

ruby whitewidow.rb -d

Will run whitewidow in default mode and scrape Google using the search queries in the lib directory

ruby whitewidow.rb -d --banner

Will scrape Google and hide the banner

ruby whitewidow.rb -d --proxy 127.0.0.1:80

Proxy configuration, must use the ":"

ruby whitewidow.rb -d --dry-run

Will do a dry run of the program, meaning it won't scan for vulnerabilities, will prompt if you want to run a scan or not

ruby whitewidow.rb -d --dry-run --batch

Will do a dry run and not prompt you for anything, won't run a scan

ruby whitewidow.rb -f <path/to/file>

Will run Whitewidow through a file, you will not need to provide whitewidow the full path to the file, just provide it the paths within the whitewidow directory itself. Also you will not need a beginning slash.